-
An exposed command-and-control server hosting a complete deployment of the BYOB (Build Your Own Botnet) framework, a sophisticated post-exploitation tool targeting Windows, Linux, and macOS systems. The discovery, made through Hunt.io’s AttackCap…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Swarmer, a sophisticated tool designed to manipulate Windows registry hives while bypassing endpoint detection systems. The tool exploits legacy Windows infrastructure to achieve persistent access without triggering traditional EDR monitoring systems t…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Another day, another fake CAPTCHA scam, but this one abuses Microsoft’s signed tools.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has released two critical out-of-band (OOB) security patches targeting widespread issues affecting Windows 11 users following January’s monthly security updates. The emergency patches, KB5078127 and KB5078132, address severe file system…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
If you are using a Windows PC, your privacy and security are nothing short of a myth, and this incident proves it.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Microsoft has announced the public preview of the Windows App Development CLI (winapp), a new open-source command-line tool designed to simplify Windows application development across multiple frameworks and toolchains. The tool is now available on Git…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated three-stage malware attack campaign against Windows users in South Korea using specially crafted LNK (shortcut) files. The attack begins with a deceptive LNK file named “실전 트레이딩 핵심 비법서.pdf.lnk” (translating to “Practic…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A sophisticated multi-stage malware campaign targeting Russian users, leveraging social engineering, legitimate cloud services, and native Windows functionality to achieve full system compromise without exploiting vulnerabilities. The campaign begins w…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A severe vulnerability in Windows Server Message Block (SMB) client authentication has emerged as a critical threat to Active Directory environments. CVE-2025-33073, a logical flaw in NTLM reflection handling, enables authenticated atta…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Windows Subsystem for Linux (WSL) has transformed the developer experience on Windows. However, it has also quietly created a powerful hiding place for attackers. With WSL2, Microsoft moved from lightweight translation to a whole virtual machine (VM) m…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


